Section:  .. / 0503-exploits  /

Page 5 of 6
<< 1 2 3 4 5 6 >> Files 100 - 125 of 142
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: phpSysInfo23.txt
Description:
phpSysInfo 2.3 is susceptible to cross site scripting flaws.
Author:Maksymilian Arciemowicz
Homepage:http://securityreason.com/
File Size:6010
Last Modified:Mar 24 07:08:20 2005
MD5 Checksum:d952f283fd4795f279524d09e05ef9dc

 ///  File Name: phpweblog053.txt
Description:
phpWebLog versions 0.5.3 and below are susceptible to an arbitrary file inclusion flaw.
Author:Filip Groszynski
Homepage:http://shell.homeunix.org
File Size:1958
Last Modified:Mar 15 05:37:55 2005
MD5 Checksum:ed643f1a87cf325af80877019241152c

 ///  File Name: platinumDoS.c
Description:
Platinum FTP versions 1.0.18 and below remote denial of service exploit.
Author:Exoduks
Related File:platinumftp.txt
File Size:1934
Last Modified:Mar 17 08:46:03 2005
MD5 Checksum:a94d0bae8f99fc03f7423decb22d3d31

 ///  File Name: portalApp.txt
Description:
Multiple SQL injection and cross site scripting vulnerabilities have been discovered in PortalApp. Sample exploitation provided.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:5199
Last Modified:Mar 29 08:13:38 2005
MD5 Checksum:bceb796bebe444666bac3de88067f3e6

 ///  File Name: postnukeSQL0760-2.txt
Description:
PostNuke 0.760-RC2 is susceptible to addtional SQL injection attacks via the download module. Full detailed exploitation provided.
Author:Maksymilian Arciemowicz
File Size:5987
Last Modified:Mar 1 22:56:45 2005
MD5 Checksum:97124f8e82fd5373015fb12687b31755

 ///  File Name: postnukeSQL0760.txt
Description:
PostNuke 0.760-RC2 is susceptible to SQL injection attacks. Full detailed exploitation provided.
Author:Maksymilian Arciemowicz
File Size:4667
Last Modified:Mar 1 22:51:26 2005
MD5 Checksum:e003fb998c26633a214a146b585a02c9

 ///  File Name: postnukeXSS.txt
Description:
PostNuke 0.760-RC2 is susceptible to cross site scripting attacks. Detail exploitation provided.
Author:Maksymilian Arciemowicz
File Size:2078
Last Modified:Mar 1 22:55:17 2005
MD5 Checksum:0a5641d103dbda1a85c6c2d109311008

 ///  File Name: projectBB0451.txt
Description:
ProjectBB version 0.4.5.1 is susceptible to cross site scripting and SQL injection vulnerabilities. Advisory is in French.
Author:Benjilenoob
File Size:1947
Last Modified:Mar 15 07:07:36 2005
MD5 Checksum:c18e9f85fd1d9ddf9d45fd469c4d164e

 ///  File Name: psnup.pl.txt
Description:
Proof of concept exploit for PostScript utility psnup from the psutils-p17 package.
Author:lammat
File Size:1830
Last Modified:Mar 22 17:04:24 2005
MD5 Checksum:6e1e08b64ca889071c2cc7db98453481

 ///  File Name: pwned.c
Description:
Local sys_uselib root exploit for the Linux 2.4 and 2.6 kernel series.
Author:sd
File Size:12653
Last Modified:Mar 22 17:08:32 2005
MD5 Checksum:61f5fec50d826adbfbbaa9de94068172

 ///  File Name: r57punbb.pl.txt
Description:
PunBB versions 1.2.2 and below remote authentication bypass exploit.
Author:1dt.w0lf
Homepage:http://www.rst.void.ru
File Size:3295
Last Modified:Mar 30 11:36:42 2005
MD5 Checksum:14ac58d49c7c030c98bb28f9d9ed98c4

 ///  File Name: real-seh.cpp
Description:
Proof of concept exploit for the Realplayer 10 .smil file local buffer overflow vulnerability.
Author:nolimit
File Size:4009
Last Modified:Mar 15 05:23:27 2005
MD5 Checksum:3ce388a1e948134b3f3506daea3cd9ab

 ///  File Name: scrapboom.zip
Description:
Remote proof of concept exploit Scrapland versions 1.0 and below which suffer from a flaw where the server terminates prematurely when it errors.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:scrapboom.txt
File Size:8623
Last Modified:Mar 1 22:35:34 2005
MD5 Checksum:15689dd060b38e91833b0ed67ab7b03d

 ///  File Name: serversAlive.txt
Description:
A vulnerability in Servers Alive versions 4.1 and 5.0 allows for local users to gain SYSTEM privileges via launching cmd.exe inside of Notepad.
Author:Michael Starks
File Size:3759
Related CVE(s):CAN-2005-0352
Last Modified:Mar 22 06:48:44 2005
MD5 Checksum:13d55d154f904f1f019f187b3a798265

 ///  File Name: silePNEWSxpl_v2.0b4.c
Description:
Exploit for the paNews version 2.0b4 SQL injection flaw.
Author:Silentium of Anacron Group Italy
Homepage:http://www.autistici.org/anacron-group-italy
Related Exploit:panews.txt"
File Size:4563
Last Modified:Mar 15 06:10:31 2005
MD5 Checksum:d2fe47bd4bf93a4712873f5ff52b00ed

 ///  File Name: simpgbSQL.txt
Description:
SimpGB from Boesch IT-Consulting is susceptible to a SQL injection attack.
Author:visus
File Size:991
Last Modified:Mar 17 08:08:41 2005
MD5 Checksum:f21faa133e650a81c877189a42b17c9c

 ///  File Name: smack.c.gz
Description:
Remote root exploit for the preparse_address_1() heap buffer overflow in Smail versions 3.20.120 and below.
Author:infamous41md
Related File:smailHeap.txt
File Size:3840
Last Modified:Mar 29 07:30:58 2005
MD5 Checksum:07ebc36eaafbfaba94becbce88dcec6b

 ///  File Name: socialMPN.txt
Description:
Simple exploit to test for the file inclusion bug in SocialMPN.
Author:y3dips
File Size:1093
Last Modified:Mar 15 05:21:01 2005
MD5 Checksum:2701e7621e0f2296e6048c23c0314705

 ///  File Name: squirrelSQL.txt
Description:
Squirrelcast PHP Shopping Cast is susceptible to SQL injection attacks. Sample exploitation details provided.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com
File Size:8426
Last Modified:Mar 30 11:45:25 2005
MD5 Checksum:568ffebf08ecc4d9abd2b3b1a6c4b296

 ///  File Name: stadtaus16.txt
Description:
Stadtaus Voting Script version 1.6 is susceptible to a remote file inclusion vulnerability.
Author:Nextime
File Size:1501
Last Modified:Mar 15 05:56:48 2005
MD5 Checksum:c6dd7021ab4fff948019df9b713f3dd1

 ///  File Name: subdreamerSQL.txt
Description:
Subdreamer's failure to properly filter user input allows for SQL injection attacks.
Homepage:http://www.ghc.ru
File Size:2869
Last Modified:Mar 22 15:29:01 2005
MD5 Checksum:2cbc1f06f3a233c7ffec35187519451d

 ///  File Name: surgemail22g3.txt
Description:
A vulnerability was found in SurgeMail's Webmail file attachment upload feature. This vulnerability may be exploited by a malicious Webmail user to upload files to certain locations on the server, obtain file listings of certain directories, and/or send certain files on the server to him/herself. Two XSS vulnerabilities were also found.
Author:Tan Chew Keong
Homepage:http://www.security.org.sg/
File Size:3154
Last Modified:Mar 24 06:59:34 2005
MD5 Checksum:11163795f76572cb966de35829ec3330

 ///  File Name: thaiXSS.txt
Description:
THai's Shoutbox is susceptible to a cross site scripting bug.
Author:CorryL
Homepage:http://www.x0n3-h4ck.org
File Size:2128
Last Modified:Mar 29 07:01:32 2005
MD5 Checksum:29757cec0a44beb39486c0c2b8f7c0c8

 ///  File Name: timbuktu_userbrute.c
Description:
Timbuktu Pro Remote Control user enumeration program. Wordlist-based bruteforce tool that checks whether a given username exists on the target server or not, which is possible due to a difference in the error message returned when the username is invalid versus when the password is invalid.
Author:Conehead
File Size:6971
Last Modified:Mar 28 12:27:28 2005
MD5 Checksum:160f3e45e55a5354c371fafb59082f05

 ///  File Name: tincat2bof.zip
Description:
Proof of concept exploit for a remotely exploitable buffer overflow in the Tincat network library used in various games.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:tincat2bof.txt
File Size:10775
Last Modified:Mar 29 07:07:35 2005
MD5 Checksum:e35a68e27f1cc93387ac11089310ac07